[PDF][PDF] Poster: A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic

N Apthorpe, D Reisman, N Feamster - 2016 - ndss-symposium.org
The increasing popularity of specialized Internetconnected devices and appliances, dubbed
the Internet-of-Things (IoT), promises both new conveniences and new privacy concerns …

A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic

N Apthorpe, D Reisman, N Feamster - arXiv preprint arXiv:1705.06805, 2017 - arxiv.org
The increasing popularity of specialized Internet-connected devices and appliances,
dubbed the Internet-of-Things (IoT), promises both new conveniences and new privacy …

Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic

N Apthorpe, D Reisman, S Sundaresan… - arXiv preprint arXiv …, 2017 - arxiv.org
The growing market for smart home IoT devices promises new conveniences for consumers
while presenting new challenges for preserving privacy within the home. Many smart home …

[PDF][PDF] IoT Privacy Preserving in Modern Smart Homes

K Yu, Q Li, D Chen - Communications, 2021 - nist.gov
The trend of applying Internet of Things (IoT) devices in smart homes is emerging in the
recent decades, which raises the concern about user privacy leakage to multiple third …

Privacyguard: Enhancing smart home user privacy

K Yu, Q Li, D Chen, M Rahman, S Wang - … co-located with CPS-IoT Week …, 2021 - dl.acm.org
The Internet of Things (IoT) devices have been increasingly deployed in smart homes and
smart buildings to monitor and control their environments. The Internet traffic data produced …

Iotspot: Identifying the iot devices using their anonymous network traffic data

L Deng, Y Feng, D Chen… - MILCOM 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) has been erupting the world widely over the decade. Smart
home owners and smart building managers are increasingly deploying IoT devices to …

TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User Privacy Inference

Q Li, K Yu, D Chen, M Sha… - 2022 IEEE Conference on …, 2022 - ieeexplore.ieee.org
People have been increasingly deploying the Internet of Things (IoT) devices to monitor and
control their environments. Unfortunately, extensive recent research has shown that IoT …

Connecting the Dots: Tracing Data Endpoints in IoT Devices

M Jakaria, DY Huang, A Das - Proceedings on Privacy …, 2024 - petsymposium.org
Smart home devices are constantly exchanging data with a variety of remote endpoints. This
data encompasses diverse information, from device operation and status to sensitive user …

Characterizing smart home iot traffic in the wild

MH Mazhar, Z Shafiq - … on Internet-of-Things Design and …, 2020 - ieeexplore.ieee.org
As the smart home IoT ecosystem flourishes, it is imperative to gain a better understanding
of the unique challenges it poses in terms of management, security, and privacy. Prior …

Preserving contextual privacy for smart home IoT devices with dynamic traffic shaping

J Brahma, D Sadhya - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) enables physical devices embedded with sensors, software, and
other technologies to interoperate and exchange data with other systems over the Internet …